A Detailed Analysis on Secured Approach to Secret Key Extraction from Wireless Signal Strength Preserving Authentication and Security

Provided by: Creative Commons
Topic: Security
Format: PDF
In this paper, the authors concerns the extension to the survey results detailed on 'A secured approach for secret key extraction from wireless signal strength preserving authentication & security'. This paper defines how authentication is implemented for secure verification scheme using the KEA algorithm and RC4 encryption is done which results in reducing the time complexity involved. Currently, the most common method for establishing a secret key is by using public key cryptography. However, public key cryptography consumes significant amount of computing resources and power which might not be available in certain scenarios.

Find By Topic